Project FARE

Publications


  • Emilio Coppa, Alessio Izzillo, Riccardo Lazzeretti, and Simone Lenti. FuzzPlanner: Visually Assisting the Design of Firmware Fuzzing Campaigns. Proceedings of the 20th IEEE Symposium on Visualization for Cyber Security (VIZSEC 2023), 2023. Best paper award.
    [DOI] [CODE] [PDF]

  • Emilio Coppa and Alessio Izzillo. Testing concolic execution through consistency checks. Journal of Systems and Software, 2024.
    [DOI] [CODE] [PDF]

  • Lorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, and Davide Maiorca. Do you Trust your Device? Open Challenges in IoT Security Analysis. Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), 2024.
    [DOI] [PDF]

  • Lorenzo Binosi, Gregorio Barzasi, Michele Carminati, Stefano Zanero, and Mario Polino. The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations. In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24), 2024.
    [DOI] [PDF] [ARTIFACT]

  • Emilio Coppa, Daniel Sokolowski, and Guido Salvaneschi. Hybrid Fuzzing of Infrastructure as Code Programs. Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis (FUZZING 2025 – ISSTA Companion 2025), 2025.
    [DOI] [PDF]

  • Luca Borzacchiello, Matteo Cornacchia, Davide Maiorca, Giorgio Giacinto, and Emilio Coppa. DroidReach++: Exploring the Reachability of Native Code in Android Applications. Elsevier Computers & Security, 2025.
    [DOI] [PDF] [CODE]

  • Marco Di Gennaro, Mario D'Onghia, Mario Polino, Stefano Zanero, and Michele Carminati. PackHero: A Scalable Graph-based Approach for Efficient Packer Identification. In Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2025), 2025.
    [DOI] [PDF] [CODE]

  • Francesco Panebianco, Andrea Isgrò, Stefano Longari, Stefano Zanero, and Michele Carminati. Guessing As A Service: Large Language Models Are Not Yet Ready For Vulnerability Detection. CEUR Workshop Proceedings, 2025.
    [PDF]

  • Lorenzo Dall'Aglio, Lorenzo Binosi, Michele Carminati, Stefano Zanero, and Mario Polino. Highliner: Enhancing Binary Analysis through NLP-Based Instruction-Level Detection of C++ Inline Functions. ACM Transactions on Privacy and Security (TOPS), 2025.
    [DOI] [PDF] [CODE]

  • Alessio Izzillo, Riccardo Lazzeretti, and Emilio Coppa. STAFF: Stateful Taint-Assisted Full-system Firmware Fuzzing. Under submission at Elsevier Computers and Security, 2026.
    [DOI] [PDF] [CODE]

Software Artifacts


  • LVFS-Analyzer – Automated crawler and triage pipeline for the Linux Vendor Firmware Service.
    [CODE]

  • FuzzPlanner – Visual analytics tool for designing firmware fuzzing campaigns.
    [CODE]

  • Debug Concolic Execution – Testing framework for identifying bugs in concolic execution engines.
    [CODE]

  • DroidReach++ – Reachability analysis of native code in Android applications.
    [CODE]

  • STAFF – Stateful taint-assisted full-system firmware fuzzing framework.
    [CODE]

  • ASLR Analysis Framework – Empirical analysis framework for ASLR implementations.
    [ARTIFACT]

  • PackHero – Scalable graph-based packer identification tool.
    [CODE]

  • Highliner – NLP-based instruction-level detection of C++ inline functions.
    [CODE]